Preventing Distributed Denial of Service Attacks: Seven Best Practices

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Preventing Distributed Denial of Service Attacks: Seven Best Practices-2 Next

Track your changes

All organizations should develop a detailed record of the purpose behind their network's design and organization. This document must be updated in real time, so that when revisited, the reasoning behind the configuration of the network infrastructure can be easily determined.

This helps users to maintain awareness of older, trusted network configurations. Because infrastructure is rarely redesigned and configurations may remain for several years, it's not rare for a network configuration to outlast personnel. To ensure that all team members are looped in, it is important to provide an overview of configurations during orientation or as part of annual auditing.

2014 is shaping up to be the year of the distributed denial of service (DDoS) attack. A DDoS attack is when malicious codes infect a computer, triggering mass attacks against targeted websites, making them inaccessible to regular users. If the attack is strong enough to affect network equipment at the perimeter of the target (e.g., firewalls), the entire network of the service under attack may stop responding.

A DDoS attack can be incredibly difficult to defend against despite the fact that it isn't considered very sophisticated. Many DDoS attacks succeed because organizations do not understand how to protect against them, and have not made it a priority. Security managers are generally well versed in choosing the most fitting technologies to counter threats such as intrusions, worms and Web application exploitations. But there is a common misconception among the security community that these same technologies can also be relied upon for DDoS protection. Perhaps the biggest misconception tied to DDoS attacks is that installing and running a single protective software on a well-known Internet platform or host is sufficient to keep the organization safe. This has been disproved in spades as recent attacks to major websites have rocked the IT community.

In this slideshow, Zensar Technologies has outlined the steps an organization can take in order to better protect itself as DDoS attacks continue to gain traction. These steps include a combination of anti-DDoS technology and anti-DDoS emergency response services.  

Zensar Technologies delivers comprehensive services in mission-critical applications, enterprise applications, e-business, business process management and knowledge services. Zensar has developed tools and methodologies, including the proprietary Solution BluePrint (SBP), which enables its clients with innovative business solutions and a rapid 'go-to-market' capability.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.